Browsing tag

malware

USCYBERCOM Warned that Hackers Exploiting Microsoft Outlook Security Vulnerability to Deliver Malware

USCYBERCOM published an alert that hackers were exploiting the CVE-2017-11774 Microsoft Outlook Security Vulnerability to deliver malware using an HTTPS domain. Microsoft already patched the vulnerability in 2017 and the USCYBERCOM alert refers to the ongoing campaign that exploiting CVE-2017-11774. Users are advised to ensure that they have patched the vulnerability. — USCYBERCOM Malware Alert […]

Third ransomware attack in Florida; will the government pay the ransom again?

It seems that Florida has become one of the favorite targets of cybercriminals. Cybersecurity services specialists report a new ransomware attack on a small-town computer systems. A few weeks ago Riviera Beach and Lake City reported severe ransomware infections on their systems; this time, the new victim of the encryption malware is the small town […]

Facebook pages infecting thousands of user with virus

A team of website security specialists detected and exposed a campaign that, taking advantage of Libya-related news, began deploying dozens of fake Facebook sites and profiles to distribute malware over the past five years.  The links used by the attackers redirected the victims to sites that hosted malware for Android and Windows equipments; one of […]

OceanLotus APT Group Uses Undetected Ratsnif Remote Trojan to Leverage Network Attack’s

OceanLotus APT Group also known as APT32, SeaLotus, and CobaltKitty uses undetected Remote Access trojans Ratsnif to leverage network attack capabilities. The trojan was active since 2016, and it has features like packet sniffing, gateway/device ARP poisoning, DNS poisoning, HTTP injection, and MAC spoofing. The Cylance Threat Research Team detected four distinct samples of Ratsnif […]

Multiple Facebook Pages Caught Spreading Remote Access Trojans Since 2014

Researchers from cybersecurity firm Check Point have uncovered a Facebook campaign that has been spreading malware since 2014. The campaign was operating under the posts that discussed the political situation in Libya. Notorious Remote Access Trojans (RATs) like SpyNote, Houdini and Remcos were spread through Facebook pages and it is believed that the residents of […]

SOC Second Defense Phase – Understanding the Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the Attack Chain. Let’s move on to the phases of SOC and advanced level of protecting the organization. Early years, when we say the virus, it’s just an ‘exe’ file with some […]

Facebook Removes Accounts That Spread Malware to Thousands of People

Researchers have discovered the Facebook account network, which uses Libyan themes and information to spread malware to tens of thousands of people over a five-year period. Links to Android and Windows-based malware caught the attention of the researcher when they found them in a Facebook post proposed as Marshal Khalifa Haftar, commander of the Libyan […]

50,000 times Downloaded Android Horror Game from GooglePlay Steals Google and Facebook Login Credentials

Android Horror game uses malicious scripts to steal the user’s login credentials and uses ad networks to drive more traffic and cause damage to the affected device. Wandera’s threat research team identified the malicious app on the Google Play Store. The app fools the Google Play Store’s rigorous security checks, “by using time-released malicious behavior, […]

Russian Google “Yandex” Hacked with Rare Type of Malware called Regin to Spy on Users Accounts

Russian Internet Giant Yandex hacked by Western intelligence agencies hackers with a rare type of malware called “Regin” to spy on Yandex users account. Yandex is a Russian search engine also specializing in Internet-related products and services including Commerce, transportation, navigation, mobile applications, and online advertising. Yandex is widely known as Russian Google. The attacker was conducted between […]

NCSC Issued an Emergency Alert for Ryuk Ransomware that Actively Attacks on Global Organizations

National Cyber Security Centre (NCSC) from the UK issued an alert for Ryuk ransomware attack that is actively targeting global organization associated with Emotet and TrickBot malware. Researcher uncovered this ongoing Ryuk ransomware infection identified in the various organization network along with Emotet and TrickBot infection. Ryuk Ransomware initially uncovered in August 2018 since then […]

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded […]

Regin Virus Infection In Yandex. Accident Or Deliberate?

The Five Eyes alliance (New Zealand, Australia, Canada, UK and the United States) allegedly launched a takedown-level cyber attack and large-scale industrial espionage against Russia’s biggest search engine and web services company, Yandex. The incident occurred between October 2018 to November 2018, the data breach includes information about Yandex’s research and development efforts at that […]

Office 365 Phishing Protection – Is Native Microsoft Protection Safe?

For the last couple of years, there has been a surge in phishing attacks against businesses and unsuspecting users. What’s worse is that phishing, which was previously merely a fraudulent attempt to obtain sensitive information, is now spreading malicious content including ransomware. While tech and cybersecurity companies are focusing on providing top-notch security to their […]

ViceLeaker Android malware steals call recordings, photos, videos & texts

Israeli Citizens are the Primary Target of New Android Mobile Spying Campaign Using ViceLeaker Malware, says Kaspersky. Kaspersky Lab researchers discovered an Android malware campaign active since 2016 and still going strong. Dubbed ViceLeaker; researchers claim that it is the product of a group of hackers that is specifically targeting Middle Eastern and Israeli citizens. […]

OSX/Linker Malware, A Weaponized Unpatched Security Bug

We rarely feature a story about MacOS security here in Hackercombat.com, as the platform is not really attractive for hackers to target. MacOS with its BSD underpinnings and minority market share compared to Redmond’s operating system we all call Windows, make it very unproductive for virus authors to bother with. However, from time-to-time, a prominent […]

Iran responds to US cyberattacks with malware that destroys IoT devices

Vulnerability testing specialists reported the emergence of a new malware variant capable of removing firmware from Internet of Things (IoT) devices. This outbreak reminds experts the malware variant known as BirckerBot, which destroyed millions of IoT devices a couple of years ago. This new malware variant, called Silex, was detected during the early hours of […]

New vulnerability on Mac is exploited with malware

IT security audit specialists from the cybersecurity firm Intego have reported supposed in the wild exploitation of an uncorrected vulnerability in some of Apple MacOS Gatekeeper security features; there is a proof of concept of this exploitation published online. A few days ago, experts discovered at least four different samples of this macOS malware on […]

New attack spreads LokiBot & NanoCore malware in ISO image files

Both NanoCore and LokiBot are Info-stealing Trojans. Security researchers at the San Francisco-based firm Netskope have discovered a new malware campaign distributing the info-stealer malware LokiBot and NanoCore via ISO image file attachments that appear to be an invoice. It is noteworthy that LokiBot malware was discovered back in October 2017 and is equipped with […]

This Malware Created By A 14-Yr-Old Is Bricking Thousands Of Devices

A new malware called Silex is on its way to brick thousands of IoT devices. The malware has been developed by a 14-year old teenager known by the pseudonym Light Leafon. The malware strain is inspired by the infamous malware called BrickerBot, which is notorious for bricking millions of IoT devices way back in 2017. […]

4 Most Memorable Botnet In History

What is Botnets? Botnets are artificial networks created by malware, which can be controlled by the virus author remotely. Here in Hackercombat.com, we have featured stories of companies which had their devices becoming a member of botnets without them knowing. Being a member of a botnet means the infected devices are kept running as usual, […]